Lucene search

K
gentooGentoo FoundationGLSA-202209-07
HistorySep 25, 2022 - 12:00 a.m.

Mrxvt: Arbitrary Code Execution

2022-09-2500:00:00
Gentoo Foundation
security.gentoo.org
17

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.015 Low

EPSS

Percentile

86.8%

Background

Mrxvt is a multi-tabbed rxvt clone with XFT, transparent background and CJK support.

Description

Mrxvt mishandles certain escape sequences, some of which allow for shell command execution.

Impact

An attacker with sufficient access to write arbitrary text to the Mrxvt terminal could execute arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

Gentoo has discontinued support for Mrxvt. We recommend that users remove it:

 # emerge --ask --depclean "x11-terms/mrxvt"
OSVersionArchitecturePackageVersionFilename
Gentooanyallx11-terms/mrxvt<= 0.5.4UNKNOWN

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.015 Low

EPSS

Percentile

86.8%